lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <0d242292-16b7-6837-7d1a-b70c41309e6b@arinc9.com>
Date:   Wed, 12 Apr 2023 19:21:25 +0300
From:   Arınç ÜNAL <arinc.unal@...nc9.com>
To:     Frank Wunderlich <frank-w@...lic-files.de>
Cc:     Rob Herring <robh+dt@...nel.org>,
        Krzysztof Kozlowski <krzysztof.kozlowski+dt@...aro.org>,
        Matthias Brugger <matthias.bgg@...il.com>,
        AngeloGioacchino Del Regno 
        <angelogioacchino.delregno@...labora.com>,
        devicetree@...r.kernel.org, linux-kernel@...r.kernel.org,
        linux-arm-kernel@...ts.infradead.org,
        linux-mediatek@...ts.infradead.org, erkin.bozoglu@...ont.com
Subject: Re: Aw: Re: Re: Re: Re: [PATCH v3 0/5] arm: dts: mt7623: relocate
 gmacs, mt7530 switch, and add port@5

On 12.04.2023 18:11, Frank Wunderlich wrote:
> Hi
> 
>> Gesendet: Mittwoch, 12. April 2023 um 16:31 Uhr
>> Von: "Arınç ÜNAL" <arinc.unal@...nc9.com>
>>> looks good so far, but i have not managed how to change dsa master from the preferred port (eth0) to the second one...
>>> any idea how the correct syntax is for iproute2?
>>
>> https://www.kernel.org/doc/html/latest/networking/dsa/configuration.html#affinity-of-user-ports-to-cpu-ports
>>
>> In short: ip link set lan0 type dsa conduit eth1
> 
> thanks, it changes the master when i upgrade iproute to 6.1 (from debian bullseye-backports), but i cannot do any traffic on it after switching to gmac1...
> 
> 5: wan@...1: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 1500 qdisc noqueue state UP group default qlen 1000
>      link/ether f2:d2:51:56:cd:3d brd ff:ff:ff:ff:ff:ff
>      inet 192.168.0.11/24 scope global wan
>         valid_lft forever preferred_lft forever
> 
> see no p5-TX/gmac-rx
> 
> root@...-r2:~# ethtool -S eth1
> NIC statistics:
>       tx_bytes: 5156
>       tx_packets: 61
>       tx_skip: 0
>       tx_collisions: 0
>       rx_bytes: 0
>       rx_packets: 0
>       rx_overflow: 0
>       rx_fcs_errors: 0
>       rx_short_errors: 0
>       rx_long_errors: 0
>       rx_checksum_errors: 0
>       rx_flow_control_packets: 0
>       rx_xdp_redirect: 0
>       rx_xdp_pass: 0
>       rx_xdp_drop: 0
>       rx_xdp_tx: 0
>       rx_xdp_tx_errors: 0
>       tx_xdp_xmit: 0
>       tx_xdp_xmit_errors: 0
>       p05_TxDrop: 0
>       p05_TxCrcErr: 0
>       p05_TxUnicast: 0
>       p05_TxMulticast: 0
>       p05_TxBroadcast: 0
>       p05_TxCollision: 0
>       p05_TxSingleCollision: 0
>       p05_TxMultipleCollision: 0
>       p05_TxDeferred: 0
>       p05_TxLateCollision: 0
>       p05_TxExcessiveCollistion: 0
>       p05_TxPause: 0
>       p05_TxPktSz64: 0
>       p05_TxPktSz65To127: 0
>       p05_TxPktSz128To255: 0
>       p05_TxPktSz256To511: 0
>       p05_TxPktSz512To1023: 0
>       p05_Tx1024ToMax: 0
>       p05_TxBytes: 0
>       p05_RxDrop: 0
>       p05_RxFiltering: 16
>       p05_RxUnicast: 11
>       p05_RxMulticast: 38
>       p05_RxBroadcast: 12
>       p05_RxAlignErr: 0
>       p05_RxCrcErr: 0
>       p05_RxUnderSizeErr: 0
>       p05_RxFragErr: 0
>       p05_RxOverSzErr: 0
>       p05_RxJabberErr: 0
>       p05_RxPause: 0
>       p05_RxPktSz64: 17
>       p05_RxPktSz65To127: 44
>       p05_RxPktSz128To255: 0
>       p05_RxPktSz256To511: 0
>       p05_RxPktSz512To1023: 0
>       p05_RxPktSz1024ToMax: 0
>       p05_RxBytes: 5156
>       p05_RxCtrlDrop: 0
>       p05_RxIngressDrop: 0
>       p05_RxArlDrop: 0
> 
> maybe i miss something?
> 
> i'm not sure it is a problem with richards Patch or p5/gmac1

Did you apply the vlan and flooding fix patches from Richard?

Arınç

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ